References
- Choi, H. S. and Ha, J. (2011a). Development of process-oriented education tool for Statistics with Excel Macro. Journal of the Korean Data & Information Science Society, 22, 643-650.
- Choi, H. S. and Ha, J. (2011b). Development of Bayes' rule education tool with Excel Macro. Journal of the Korean Data & Information Science Society, 23, 905-912. https://doi.org/10.7465/jkdi.2012.23.5.905
- Choi, H. S. and Kim, T. Y. (2010). A study on sampling using the function of excel. Journal of the Korean Data & Information Science Society, 21, 481-491.
- Forouzan, B. A. (2008). Introduction to cryptography and network security, The McGraw-Hill Companies, New York.
- Hoffstein, J., Pipher, J. and Silverman, J. H. (2008). An introduction to mathematical cryptography, Springer, New York.
- Kahn, D. (1996). The codebreakers : The story of secret writing, Scribner's, New York.
- Rivest, R. L., Shamir, A. and Adleman, L. (1978). A method of obtaining digital signature and public-key cryptosystem. Communication of the Association for Computing Machinery, 21, 120-126. https://doi.org/10.1145/359340.359342
- Shannon, C. E. (1949). Communication theory of secrecy system. The Bell Laps Technical Journal, 28, 656-715.
- Trappe, W. and Washington, L. (2006). Introduction to cryptography and coding theory, Prentice Hall, Upper Saddle River.
Cited by
- Computer intensive method for extended Euclidean algorithm vol.25, pp.6, 2014, https://doi.org/10.7465/jkdi.2014.25.6.1467
- An educational tool for regression models with dummy variables using Excel VBA vol.24, pp.3, 2013, https://doi.org/10.7465/jkdi.2013.24.3.593
- An educational tool for binary logistic regression model using Excel VBA vol.25, pp.2, 2014, https://doi.org/10.7465/jkdi.2014.25.2.403
- On the development of DES encryption based on Excel Macro vol.25, pp.6, 2014, https://doi.org/10.7465/jkdi.2014.25.6.1419
- 공인인증서의 암호학 활용에 관한 연구 vol.28, pp.1, 2012, https://doi.org/10.7465/jkdi.2017.28.1.163